The cousins of stuxnet: Duqu, flame, and gauss B Bencsáth, G Pék, L Buttyán, M Felegyhazi Future Internet 4 (4), 971-1003, 2012 | 270 | 2012 |
Duqu: Analysis, detection, and lessons learned B Bencsáth, G Pék, L Buttyán, M Félegyházi ACM European Workshop on System Security (EuroSec) 2012, 2012 | 140 | 2012 |
A Survey of Security Issues in Hardware Virtualization G Pék, L Buttyán, B Bencsáth ACM Comput. Surv. 45 (3), 40:1-40:34, 2013 | 130 | 2013 |
Duqu: A Stuxnet-like malware found in the wild B Bencsáth, G Pék, L Buttyán, M Félegyházi | 106 | 2011 |
nEther: In-guest Detection of Out-of-the-guest Malware Analyzers G Pék, B Bencsáth, L Buttyán Proceedings of the Fourth European Workshop on System Security, 1-6, 2011 | 93 | 2011 |
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment G Pék, A Lanzi, A Srivastava, D Balzarotti, A Francillon, C Neumann Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 38 | 2014 |
sKyWIper (aka Flame aka Flamer): A complex malware for targeted attacks B Bencsáth, G Pék, L Buttyán, M Félegyházi CrySyS Lab Technical Report, No. CTR-2012-05-31, 2012 | 23 | 2012 |
Consistency verification of stateful firewalls is not harder than the stateless case L Buttyán, G Pék, T Ta Vinh HTE 64 (2009/II), 2-8, 2009 | 20 | 2009 |
The cousins of stuxnet: Duqu, flame, and gauss B Boldizsar, P Gabor, B Levente, F Mark Future Internet 4 (4), 971-1003, 2012 | 13 | 2012 |
Mentoring Talent in {IT}{Security–A} Case Study L Buttyán, M Félegyházi, G Pék 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016 | 12 | 2016 |
Universal autonomous robot navigation using quasi optimal path generation A Laszka, AR Varkonyi-Koczy, G Pek, P Varlaki 2009 4th International Conference on Autonomous Robots and Agents, 458-463, 2009 | 11 | 2009 |
Membrane: a posteriori detection of malicious code loading by memory paging analysis G Pék, Z Lázár, Z Várnagy, M Félegyházi, L Buttyán Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 10 | 2016 |
Towards the Automated Detection of Unknown Malware on Live Systems G Pék, L Buttyán IEEE International Conference on Communications (ICC), 2014 | 8 | 2014 |
Duqu: A Stuxnet-like malware found in the wild B Boldizsár, P Gábor, B Levente, M Félegyházi Budapest University of Technology and Economics, Department of …, 2011 | 7 | 2011 |
New methods for detecting malware infections and new attacks against hardware virtualization G Pék Budapesti Műszaki és Gazdaságtudományi Egyetem, 2015 | 4 | 2015 |
An Improved Hybrid Navigation Method G Pék, A Laszka, AR Varkonyi-Koczy 7th International Conference On Global Research and Education in Intelligent …, 2008 | 3 | 2008 |
Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts G Pék Xen Security Advisory 59, 2013 | | 2013 |
eNeMI: Evading the state-of-the-art hardware protection of I/O virtualization G Pék | | 2013 |
nEther G Pék, B Bencsáth, L Buttyán Proceedings of the Fourth European Workshop on System Security, 2011 | | 2011 |
Dhāranā from the Perspective of Computer Science G Pék, GM Timčák | | |